Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4460736237e9ee7add404ea6145c56197a0ef5ad6bb039bbc55b3bb28c053579.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4460736237e9ee7add404ea6145c56197a0ef5ad6bb039bbc55b3bb28c053579.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4460736237e9ee7add404ea6145c56197a0ef5ad6bb039bbc55b3bb28c053579
-
Size
4.5MB
-
MD5
6f64b90f11d0fe961774f3e60df630f2
-
SHA1
a0b8821419b58ff31b8564f3e04ae01acf4f43f5
-
SHA256
4460736237e9ee7add404ea6145c56197a0ef5ad6bb039bbc55b3bb28c053579
-
SHA512
286bdc65f80e9346d26eecea6516762315a5b4d0b76f9be4d4a2b3d174996c46319058cd171a35b0f895c0cc0d8abe094cfa0c5ad825cce5c25a8d74364e984d
-
SSDEEP
98304:rATltrh1QHUAyG1JrfdSZ5txc8R2lsKO7tv45sPq1aL56lnsfzW:rAJtjSbdSPcS223twaPq1sbW
Malware Config
Signatures
Files
-
JaffaCakes118_4460736237e9ee7add404ea6145c56197a0ef5ad6bb039bbc55b3bb28c053579.exe windows:5 windows x86 arch:x86
84f1e7a5f56275e19c9e08b5149189ca
Code Sign
c8:b5:1d:fe:52:ed:8e:68:42:eb:d4:d1:19:13:f0:01Certificate
IssuerPOSTALCODE=10188Not Before09-09-2021 19:29Not After09-09-2022 19:29SubjectPOSTALCODE=10188b6:44:65:8c:1f:d6:d9:be:f8:91:ef:d9:8d:44:7f:d5:e4:ff:c7:fb:61:2b:6c:81:f7:23:a2:6f:b2:65:fe:e7Signer
Actual PE Digestb6:44:65:8c:1f:d6:d9:be:f8:91:ef:d9:8d:44:7f:d5:e4:ff:c7:fb:61:2b:6c:81:f7:23:a2:6f:b2:65:fe:e7Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\rusaxejiroyap\fejopuvet81\zuw.pdb
Imports
kernel32
DosDateTimeToFileTime
FindFirstChangeNotificationW
CopyFileExW
SetLocalTime
GetCPInfo
GetConsoleAliasExesLengthA
HeapAlloc
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
GetSystemWindowsDirectoryW
CreateDirectoryW
GetProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetCurrentThread
GetPrivateProfileStringW
SetCommState
GetCommandLineA
SetProcessPriorityBoost
TlsSetValue
ActivateActCtx
GlobalAlloc
GetVolumeInformationA
LoadLibraryW
IsProcessorFeaturePresent
TerminateProcess
GetCompressedFileSizeA
lstrlenW
SetThreadPriority
GetNamedPipeHandleStateW
LCMapStringA
GetPrivateProfileIntW
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetStdHandle
GetLastError
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
DisableThreadLibraryCalls
Process32FirstW
WritePrivateProfileStringA
FindAtomA
SetEnvironmentVariableA
FindNextFileA
GetThreadPriority
QueryMemoryResourceNotification
HeapSetInformation
EnumResourceNamesA
GetStringTypeW
WriteProfileStringW
CompareStringA
GetCPInfoExA
GetVersionExA
CopyFileExA
FlushFileBuffers
CloseHandle
MultiByteToWideChar
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
GetCurrentThreadId
TlsFree
SetLastError
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LCMapStringW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
user32
GetMessageTime
winhttp
WinHttpOpen
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 43.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ